background preloader

Programming

Facebook Twitter

Open Source Project Hosting. NTLEA - NT Locale Emulator Advance NTLEAS is a Successor of NTLEA in C lang, which is a Location Emulator Written by LoveHinaAdvance with ASM lang.

Open Source Project Hosting

It supports Windows XP - 8.0/8.1, even laterOS. release: Ntleas Core.GUI Build 37 - Apr 10, 2014 Version: 1.0.0b Build: 37 Description Fix Bugs when open rar files with space in the path. Fix Bugs when open ntleasWin GUI without as administra... CS-Script for Notepad++ (C# intel... Notepad++ plugin for C# intellisense and CS-Script integration. Release: Release 1.0.21.0 - Apr 9, 2014 Implemented Integrated Debugger Previous release features - Step Over - Step In - Step Out - Set Next Statement - Toggle breakpoint - '... KerbalAlarmClock Source code for Plugin to KSP This plugin allows people to set alarms and kill warp rate when these are triggered. Programming literacy » Core units.

Ruby

Python. C. "Hello World" OS. Alternative to CAPTCHA - Protect Web Forms from Spam with Javascript. What’s the ideal check to protect your web forms from spambots?

Alternative to CAPTCHA - Protect Web Forms from Spam with Javascript

No one really likes having to copy squiggly letters from a CAPTCHA image, but is there a better alternative? The ideal check would be one that most people don’t ever notice, but which effectively keeps out all spambots. In this tutorial, I describe a technique that uses Javascript to recognise human activity based on screen events, which works very well for us. In a discussion on Scratch Forums on the merits of CAPTCHA, one of our members suggested a possible alternative that detected JavaScript events (mouse events, keystrokes) to show that it’s a human completing the form.

I took on the challenge of creating a simple JS-based alternative to CAPTCHA, which I’ll explain below. High-level Requirements Am I Human? First of all, our form will need some way of sending the answer to “am I human” through to the back-end script. For this, I’ll just use a hidden field. Switch it For Humans Testing Results with Script. Mozilla Developer Network. The 5 types of programmers « Steven Benner's Blog.

In my code journeys and programming adventures I’ve encountered many strange foes, and even stranger allies.

The 5 types of programmers « Steven Benner's Blog

I’ve identified at least five different kinds of code warriors, some make for wonderful comrades in arms, while others seem to foil my every plan. However they all have their place in the pantheon of software development. Without a healthy mix of these different programming styles you’ll probably find your projects either take too long to complete, are not stable enough or are too perfect for humans to look upon. The duct tape programmer The code may not be pretty, but damnit, it works! This guy is the foundation of your company.

The OCD perfectionist programmer. 25 Best SSH Commands / Tricks. OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on.

25 Best SSH Commands / Tricks

Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. The encryption that OpenSSH provides has been strong enough to earn the trust of Trend Micro and other providers of cloud computing.Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions.

Introduction to Computer Science and Programming - Download free content from MIT. CSS, Web Development, Color Tools, SEO, Usability etc. Vitaly Friedman's The Web Developer's Handbook creativity | css galleries & showcases | color tools | color schemes, palettes | color patterns | fashion: colors selection | color theory | royalty free photos | css daily reading | web design daily reading | css layouts | css navigation menus | css techniques | css: software & Firefox Extensions | css-web-tools & services |

CSS, Web Development, Color Tools, SEO, Usability etc.

Java

HTML. Easy PHP Blackhole Trap with WHOIS Lookup for Bad Bots. One of my favorite security measures here at Perishable Press is the site’s virtual Blackhole trap for bad bots.

Easy PHP Blackhole Trap with WHOIS Lookup for Bad Bots

The concept is simple: include a hidden link to a robots.txt-forbidden directory somewhere on your pages. Bots that ignore or disobey your robots rules will crawl the link and fall into the trap, which then performs a WHOIS Lookup and records the event in the blackhole data file. Once added to the blacklist data file, bad bots immediately are denied access to your site. I call it the “one-strike” rule: bots have one chance to follow the robots.txt protocol, check the site’s robots.txt file, and obey its directives.

Failure to comply results in immediate banishment. In five easy steps, you can set up your own Blackhole to trap bad bots and protect your site from evil scripts, bandwidth thieves, content scrapers, spammers, and other malicious behavior. The Blackhole is built with PHP, and uses a bit of .htaccess to protect the blackhole directory. Installation Overview. Programming. Periodic Table of the Elements - Josh Duck. CSE 190 M, Summer 2010. Learn How to Code this Weekend - Lifehacker.

CSS